Analysis of Security Requirements of Futuristic Mobile Applications
暂无分享,去创建一个
[1] T. Greenhalgh,et al. Adoption, non-adoption, and abandonment of a personal electronic health record: case study of HealthSpace , 2010, BMJ : British Medical Journal.
[2] Chin-Ling Chen,et al. The design of a secure anonymous Internet voting system , 2004, Comput. Secur..
[3] Ling Liu,et al. Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[4] Luc Bouganim,et al. Secure personal data servers , 2010, Proc. VLDB Endow..
[5] Noboru Sonehara,et al. Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.
[6] Reihaneh Safavi-Naini,et al. Privacy preserving EHR system using attribute-based infrastructure , 2010, CCSW '10.
[7] Eric Horvitz,et al. Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.
[8] Yuguang Fang,et al. SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[9] Henning Müller,et al. Strategies for health data exchange for secondary, cross-institutional clinical research , 2010, Comput. Methods Programs Biomed..
[10] Mark A. Rothstein,et al. Compelled Authorizations for Disclosure of Health Records: Magnitude and Implications , 2007, The American journal of bioethics : AJOB.
[11] Alexander Hörbst,et al. Attitudes and behaviors related to the introduction of electronic health records among Austrian and German citizens , 2010, Int. J. Medical Informatics.
[12] Cyrus Peikari,et al. Maximum Wireless Security , 2002 .
[13] Jie Wang,et al. Towards a practical, secure, and very large scale online election , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[14] Dimitris Gritzalis,et al. Secure Electronic Voting , 2003, Advances in Information Security.
[15] Marinella Petrocchi,et al. SEAS, a secure e-voting protocol: Design and implementation , 2005, Comput. Secur..
[16] Leslie S. Liu,et al. Barriers to the adoption and use of personal health record systems , 2011, iConference.
[17] Johannes A. Buchmann,et al. Introduction to Cryptography , 2001 .
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[19] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[20] Thomas Neubauer,et al. A methodology for the pseudonymization of medical data , 2011, Int. J. Medical Informatics.
[21] Maryam Ahmadi,et al. Security Requirements and Solutions in Electronic Health Records: Lessons Learned from a Comparative Study , 2010, Journal of Medical Systems.
[22] Berry Schoenmakers. Compensating for a lack of transparency , 2000, CFP '00.
[23] Thad E. Hall,et al. Internet Voting in Comparative Perspective: The Case of Estonia , 2009, PS: Political Science & Politics.
[24] Kåre Vollan. Voting in Uncontrolled Environment and the Secrecy of the Vote , 2006, Electronic Voting.
[25] Mario Piattini,et al. Security requirements engineering framework for software product lines , 2010, Inf. Softw. Technol..
[26] Dimitris Gritzalis. Principles and requirements for a secure e-voting system , 2002 .